HIT Consultant Insightful coverage of healthcare innovation
 

it policy

Results 101 - 125 of 349Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Feb 24, 2017
It’s important to understand that while security policy provides IT organizations with a platform to manage security, it doesn’t provide specific solutions. For that, we need to look at exactly what you ought to be protecting. Download this brief to learn more.
Tags : 
    
VMware
Published By: VMware AirWatch     Published Date: Feb 21, 2017
"Mobile and cloud deployment issues are dominating the concerns of organizations today. End-user mobility and flexibility versus IT control and visibility are the opposing requirements challenging even the most nimble of environments. Organizations are searching for several key capabilities to address this dichotomy: • Infrastructure that is optimized for end users to drive down costs, simplify acquisition, upgrade easily, and support policy management • Flexibility in delivering workspaces to users—on-premises, cloud, and offline—all within a unified workspace with single sign-on • Management capabilities encompassing the entire ecosystem and providing security, compliance, and management of day-to-day end-user environments Download this asset to learn how VMware addresses these needs more effectively than Citrix with the VMware mobile-cloud architect."
Tags : 
    
VMware AirWatch
Published By: Mimecast     Published Date: Feb 13, 2017
Security and risk (S&R) pros have the challenging task of using finite resources (including budget, time, and people) to protect their businesses from every possible attack type. On top of this, S&R pros don’t just need to watch out for threats coming from outside their walls, but must keep an eye on internal threats as well. S&R decision-makers face threats from three groups of insiders – compromised accounts (internal accounts that have been compromised by external attacks), careless misuse (internal policy violators and those who accidentally leak or expose data or systems), and malicious insiders (insiders who purposefully take or misuse data or exploit systems), and they must be prepared for each. In February 2017, Mimecast commissioned Forrester Consulting to evaluate the state of enterprise security readiness for internal email threats.
Tags : 
email security, internal threats, mimecast, forrester
    
Mimecast
Published By: Smarsh     Published Date: Dec 07, 2016
This guide contains practical steps that will help you develop a social media strategy so you gain maximum business value from your social efforts. It also outlines some smart policy suggestions—so you can ensure that your organization is protected from damage to your brand’s reputation and the risk of litigation.
Tags : 
    
Smarsh
Published By: VMware     Published Date: Nov 04, 2016
This 11-page whitepaper discusses the agility needs of today’s business, how IT is choosing a hybrid cloud approach to meet demand, and how hybrid cloud brings more agility but also increases management complexity in an environment that encompasses traditional architectures, private clouds, and public clouds. The paper outlines the role of a cloud management platform with vRealize® Suite for enabling faster and secure provisioning with monitoring and policy-driven controls. It highlights the 3 use cases (Intelligent Ops, Automated IT to Iaas, DevOps-Ready IT), the need for Day 1 and Day 2 capabilities, and how vRealize Suite helps automate IT.
Tags : 
    
VMware
Published By: VMware     Published Date: Nov 04, 2016
The digital economy is changing expectations for IT organizations, driving the need to rapidly provide resources to development, QA, and line-of-business teams to develop and roll out applications. While business wants IT to be more responsive, IT must address the need for speed with policy-driven governance, compliance, security, and performance. In our eBook, “Top 3 Reasons Why You Need Cloud Management,” we define the need for cloud management platforms, expand on the requirements and take a closer look at how other organizations are deploying cloud management platforms to improve management of the entire IT services delivery lifecycle.
Tags : 
    
VMware
Published By: NAVEX Global     Published Date: Oct 18, 2016
If you are looking for a deeper understanding of how to effectively and efficiently manage your organization’s employee handbook, code of conduct, and policies and procedures, The Definitive Guide to Policy Management is your go-to resource.
Tags : 
    
NAVEX Global
Published By: Microsoft Office 365     Published Date: Sep 20, 2016
Data security isn’t just about data security. It’s about job security. And marketing. And finance. And company valuation. Download the new eBook to see what questions you need to ask about your organization’s security measures, why they matter, and what else you need to know. Here’s what you need to ask your team: 1. Do you feel limited by budget or staff size? 2. How often do you see unsanctioned cloud services in use? 3. Are you protecting yourself against insider threats? 4. Do you have a cybersecurity task force in place? 5. Is your "bring your own device" policy secure?
Tags : 
    
Microsoft Office 365
Published By: HPE Service Virtualization     Published Date: Aug 18, 2016
When companies invest in a performance center of excellence, it can take up to three years before it starts paying dividends back. As a result, customers are happier, outages are a seemingly rare occurrence, and performance becomes prioritized as a standard policy for application development and deployment.
Tags : 
    
HPE Service Virtualization
Published By: Microsoft     Published Date: Jul 07, 2016
Every organization and every industry is being transformed by the trend towards cloud and mobility. There is no shortage of narrow point solutions that can provide bits and pieces of the overarching solution you need – but modern IT departments face enough day-to-day challenges without having to constantly fine tune and integrate a bunch of different products. We’ve assembled a step-by-step guide to help you address the challenges you face as you work to go mobile, stay mobile, and protect your data with an end-to-end solution. Download this free e-book to learn: • How application policy relates to providing secure e-mail • How to set up policy for MAM without enrollment apps via application managed policy • How to create device configuration policies for both corporate-owned and personally owned devices • How to authenticate and authorize access to your company resources • How to get end-to-end protection for mobile e-mail up and running in your own environment.
Tags : 
technology, best practices, data, enterprise
    
Microsoft
Published By: Black Duck Software     Published Date: May 18, 2016
Using open source code is not necessarily a problem, but not knowing what open source you’re using can be extremely dangerous, particularly when so much open source contains security flaws. In fact, the latest Future of Open Source Survey found that: - 55 percent of respondents had no formal policy or procedure for open source consumption - 98 percent were unaware of the open source code they were using "Application Security in 2016," a complimentary report from Black Duck Software, considers the key application security challenges your organization will face, with a special focus on staying both agile and secure with open source. Download the report today!
Tags : 
black duck, application security, security, open source, code
    
Black Duck Software
Published By: Tripp Lite     Published Date: May 17, 2016
While the use of power strips in healthcare and medical facilities is common, the misuse of these devices is also common. Such misuse can result in citations, fines, or even patient injury at your facility. This white paper covers: • Common mistakes in the use of power strips • Ways to avoid making the common mistakes • How to develop and implement a power strip policy to ensure that your facility complies with codes and standards while reducing risk to patients and staff
Tags : 
compliance, safety, power strip, codes, standards, citations, fines, patient injury
    
Tripp Lite
Published By: CradlePoint     Published Date: May 17, 2016
Healthcare IT Enabled by 4G LTE It’s time for healthcare providers to change the way they think about their services. No longer is healthcare simply about healing sick patients in the confines of the office or hospital. Growing competition driven by changes in public policy and consumer expectations mean that healthcare organizations must find ways to meet patients where they want and need healthcare the most—which requires extending care, and connectivity, beyond the boundaries of traditional healthcare facilities.
Tags : 
    
CradlePoint
Published By: Cisco     Published Date: Apr 11, 2016
Cisco made Application Policy Infrastructure Controller Enterprise Module (APIC-EM) generally available on November 3rd, 2015. It is an SDN controller that supports apps that make WAN and access networks easier to deploy and manage. Cisco’s focus on a low-risk, incremental approach to adopting SDN will appeal to its user-base. Cisco needs to describe the policy control capabilities benefits of APIC-EM, and also highlight its power as a platform and its ability to distinguish apps from point solution offerings from many other companies with competitive features.
Tags : 
esg brief, cisco apic, sdn controller, wan, sdn
    
Cisco
Published By: CDW - NetApp     Published Date: Apr 07, 2016
A critical step in moving from a shared virtualized environment toward a private cloud is the transition from infrastructure optimization to service optimization. NetApp’s design approach, technologies, and ecosystem integration build upon our storage efficiencies to deliver service-level efficiencies using centralized, policy-based management and automation. With NetApp® OnCommand® Workflow Automation, an efficient service-oriented approach can be implemented that enables storage provisioning, data protection, and operational processes to be integrated and automated. As a result, enterprises can meet workload service-level requirements while greatly reducing management costs and improving business agility.
Tags : 
cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology
    
CDW - NetApp
Published By: CDW     Published Date: Apr 04, 2016
A critical step in moving from a shared virtualized environment toward a private cloud is the transition from infrastructure optimization to service optimization. NetApp’s design approach, technologies, and ecosystem integration build upon our storage efficiencies to deliver service-level efficiencies using centralized, policy-based management and automation. With NetApp® OnCommand® Workflow Automation, an efficient service-oriented approach can be implemented that enables storage provisioning, data protection, and operational processes to be integrated and automated. As a result, enterprises can meet workload service-level requirements while greatly reducing management costs and improving business agility.
Tags : 
cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology
    
CDW
Published By: Cisco     Published Date: Mar 16, 2016
This white paper reveals how Cisco’s Threat-Centric Security Solutions for Service Providers delivers consistent security policy across physical, virtual, and cloud environments by combining the power of open and programmable networks with deep integration of Cisco and third-party security services.
Tags : 
cyber threat, security, security solutions, service providers, security protection, cisco, security policies, security services
    
Cisco
Published By: IBM     Published Date: Feb 26, 2016
"71% of consumers do some digital research before buying an insurance policy, and 26% of those surveyed had purchased their policies online. Insurance companies are investing in interactive websites, mobile apps, and analytics software to help them optimize their processes, increase sales, improve customer service, and boost their financial standing. But is this enough to keep up? As technology continues to advance, leading insurance companies are already looking ahead to the next big advance that will transform the industry: cognitive computing."
Tags : 
cognitive computing, analytics software, ibm, insurance, process automation
    
IBM
Published By: HP     Published Date: Dec 03, 2015
When companies invest in a performance center of excellence, it can take up to three years before it starts paying dividends back. As a result, customers are happier, outages are a seemingly rare occurrence, and performance becomes prioritized as a standard policy for application development and deployment.
Tags : 
    
HP
Published By: VMware AirWatch     Published Date: Nov 12, 2015
Historically in the enterprise, Macs have been managed separately from iOS devices in separate consoles, sometimes by different groups within IT. Traditional domain-joined management posed several problems for today’s modern enterprise. Nowadays, managing Macs like mobile devices means they can be configured over the air, without ever having to be domain-joined. That’s a major plus for global organizations, remote workers and companies who use contractors or freelancers. Unifying parallel device environments enables streamlined oversight, management and distribution of content across Macs and iOS devices. With AirWatch® Enterprise Mobility Management, IT can implement a BYOD program and policy for all device types, ensuring personal information remains private. IT has a consistent management experience for all device types and operating systems, enabling a single-pane-of-glass view of all endpoints in an enterprise.
Tags : 
vmware, emm, mac management, managing macs, airwatch
    
VMware AirWatch
Published By: FICO     Published Date: Nov 10, 2015
"ACG Michigan, a large auto insurance underwriter in the US state of Michigan, needed a user-friendly system that would enable its agents (internal and independent) to churn out precise and consistent policy quotes and underwriting decisions. They turned to FICO Blaze Advisor decision rules management system to create an enterprise decision management framework to execute decisions. Learn more on how FICO Blaze Advisor helped ACG Michigan automate its underwriting About FICO FICO (NYSE: FICO), formerly known as Fair Isaac, is a leading analytics software company, helping businesses in 90+ countries make better decisions that drive higher levels of growth, profitability and customer satisfaction. The company's groundbreaking use of Big Data and mathematical algorithms to predict consumer behavior has transformed entire industries. FICO provides analytics software and tools used across multiple industries to manage risk, fight fraud, build more profitable customer relationships, optimiz
Tags : 
decision analytics, optimization, profitability
    
FICO
Published By: FICO     Published Date: Nov 10, 2015
ACG Michigan, a large auto insurance underwriter in the US state of Michigan, needed a user-friendly system that would enable its agents (internal and independent) to churn out precise and consistent policy quotes and underwriting decisions. They turned to FICO Blaze Advisor decision rules management system to create an enterprise decision management framework to execute decisions.
Tags : 
auto, insurance, underwriting
    
FICO
Published By: Juniper Networks     Published Date: Oct 19, 2015
The guidelines provided in this white paper make up some of the best practices entailed in creating an overall security policy for your organization that underlies deployment of effective firewalls.
Tags : 
juniper, firewall, threat, security, policy, configuration, packet
    
Juniper Networks
Published By: Cisco     Published Date: Sep 17, 2015
View this infographic to learn how Cisco's ACI can produce benefits throughout your company, from fully automating IT and standardizing policy to reducing costs across your departments.
Tags : 
datacenter, aci, enterprise, networking
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.